Fig. 12From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesCosine similarity between malicious accounts and benign accounts in the cluster with best Silhouette scoreBack to article page